General
-
Target
69a04023bdd1388f99056d8342a6cb6a8ed55fefaf52565f703ed631c47c0527
-
Size
621KB
-
Sample
231207-cs71dagghp
-
MD5
3ca785b7f0db00dd5276648a077c7078
-
SHA1
2fa0ee8aa6f8f92ae4249575ec07b88b4571babf
-
SHA256
69a04023bdd1388f99056d8342a6cb6a8ed55fefaf52565f703ed631c47c0527
-
SHA512
b115ad503a5014aebd454c21c6532f31be768aec48ec91888e0fa2855eebe518e6c3369274688af355d02f5ebb0405d61afa666eaa52ae3849e63b90de3c3c9a
-
SSDEEP
12288:yueH5qdP9MoSWIvd86wsUpi15//BT5ds4H5qlHtmSC88p:mqvMoid8JxoZBFds4ZqTC8
Static task
static1
Behavioral task
behavioral1
Sample
69a04023bdd1388f99056d8342a6cb6a8ed55fefaf52565f703ed631c47c0527.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
69a04023bdd1388f99056d8342a6cb6a8ed55fefaf52565f703ed631c47c0527.exe
Resource
win10v2004-20231130-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.worlorderbillions.top - Port:
587 - Username:
[email protected] - Password:
7ace90qwerty - Email To:
[email protected]
Targets
-
-
Target
69a04023bdd1388f99056d8342a6cb6a8ed55fefaf52565f703ed631c47c0527
-
Size
621KB
-
MD5
3ca785b7f0db00dd5276648a077c7078
-
SHA1
2fa0ee8aa6f8f92ae4249575ec07b88b4571babf
-
SHA256
69a04023bdd1388f99056d8342a6cb6a8ed55fefaf52565f703ed631c47c0527
-
SHA512
b115ad503a5014aebd454c21c6532f31be768aec48ec91888e0fa2855eebe518e6c3369274688af355d02f5ebb0405d61afa666eaa52ae3849e63b90de3c3c9a
-
SSDEEP
12288:yueH5qdP9MoSWIvd86wsUpi15//BT5ds4H5qlHtmSC88p:mqvMoid8JxoZBFds4ZqTC8
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-